Explore ggshield commands (quota and config basics)

What ggshield commands are available? First is quota, which checks how many API calls you have remaining for your GitGuardian workspace: ggshield quota As a rule of thumb, Starter plans include 10,000 API calls per month, and Business and Enterprise plans start at 100,000 calls per month. Next is config, which acts like the CLI control panel. ggshield uses YAML configuration to define how the CLI behaves, and you can tune it per repository.

Secure & Unified Login for Shopify Plus Storefront via Single Sign-On

On Shopify Plus, every part of the customer journey needs to feel effortless — and the login experience sits right at the front. When you’re running multiple Shopify Plus stores, catering to global shoppers, or managing a growing network of B2B customers, even small login roadblocks can escalate into bigger issues: customer drop-offs, abandoned carts, and frustrated buyers. Shopify's built-in login options work for simple stores, but Plus merchants often face more complex identity challenges.

Best Practices for Enterprise macOS Security: Tools, Techniques, and Detection Strategies

macOS data is increasingly targeted by hackers due to the sensitive information that Macs hold. Users require strong Mac cybersecurity measures to protect themselves from attacks. Combining Mac's built-in security features with third-party solutions provides hardened protection and continuous detection. Endpoint security for Mac best practices improve your enterprise macOS security. Implement secure configurations, effective device management, and real-time detection for advanced protection. Using a multi-protection strategy increases recovery speed and reduces the attack surface.

How Precision Manufacturing Strengthens Modern Supply Chain Security

In today's increasingly interconnected global economy, supply chains are more complex and more vulnerable than ever before. Unexpected disruptions, quality inconsistencies, and rising consumer expectations demand that every component used in production meets strict standards. This is where precision manufacturing plays a central role. By ensuring that even the smallest part is produced with accuracy and consistency, companies are able to maintain operational stability and product reliability.

The Hidden Costs of Building Your Own Data Masking tool

Building an in-house data masking tool often starts as a practical decision. The logic feels sound. Your team understands the data, knows the systems, and can tailor masking logic exactly to your needs. On the surface, it looks like a short engineering project that saves licensing costs and avoids external dependencies. What we’ve learned, after observing many organizations take this path, is that the hidden costs of building your own data masking solution rarely appear during the initial build.

Authenticate ggshield with GitGuardian (browser login, tokens, and api-status)

Now that ggshield is installed, the next step is to authenticate it with GitGuardian so it can scan and talk to the API. The most common method is browser-based login: ggshield auth login This opens your browser and prompts you to sign in through the GitGuardian dashboard. It automatically generates an access token for you and stores it safely in your local configuration. By default, the token is scoped for secret scanning, which is what most people need. We’ll revisit scopes later.

Why Preserving Data Structure Matters in De-Identification APIs

When it comes to data masking or de-identification, one often-overlooked detail is the importance of preserving the original data structure. While it might seem harmless to normalize extra spaces or convert unique newline characters into a standard format, these subtle changes can actually have a significant impact on downstream processing. Let’s explore why this matters, with a couple of concrete examples.

From Finding to Fix: Remediation Orchestration When Asset Ownership Is Missing

Security teams don’t struggle to find issues. They struggle to move them forward. In this use case demo, we show how remediation coordination breaks down when assets have no clear owner, and how remediation orchestration restores accountability across teams, tools, and environments. You’ll see how security teams can move beyond manual handoffs, Slack messages, and guesswork by orchestrating remediation across teams, even when ownership is unclear or spans multiple domains.